|
" Autonomous cyber deception : "
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.
Document Type
|
:
|
BL
|
Record Number
|
:
|
859681
|
Main Entry
|
:
|
Al-Shaer, Ehab S.,1967-
|
Title & Author
|
:
|
Autonomous cyber deception : : reasoning, adaptive planning, and evaluation of HoneyThings /\ Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer,, 2019.
|
Page. NO
|
:
|
1 online resource (xvi, 235 pages) :: illustrations (some color)
|
ISBN
|
:
|
3030021092
|
|
:
|
: 3030021106
|
|
:
|
: 3030021114
|
|
:
|
: 9783030021092
|
|
:
|
: 9783030021108
|
|
:
|
: 9783030021115
|
|
:
|
9783030021092
|
Contents
|
:
|
1 Using Deep Learning to Generate Relational HoneyData.- 2 Towards Intelligent Cyber Deception Systems.- 3 Honeypot Deception Tactics.- 4 Modeling and Analysis of Deception Games based on Hypergame Theory.- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception.- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception -- Framework, Metrics and Deployment.- 7 NetShifter -- A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution.- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection.- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views.- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception.- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
|
Abstract
|
:
|
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25
|
Added Entry
|
:
|
Hamlen, Kevin
|
|
:
|
Wang, Cliff
|
|
:
|
Wei, Jinpeng
|
| |